Feb 29, 2020 | Business, compromised machines, Corporate Reputation, Critical data, Cryptocurrency, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data, Data Assets, Databases, Disaster Recovery, Financial, Hacking, Malware, Malware, Radio Show, Radio_Show, Ransomware, Security, Security, Technology, Technology, trojans, Zero-Day
Businesses Beware: Ransomware is on the rise, again Companies are under attack from Ransomware gangs and are paying a high price. Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...
Feb 29, 2020 | Apple, Apple, Attack Vectors, Best Practices, Big Tech, Cybercrime, Cybersecurity, Hackers, Hacking, iMac, iPad, Laptops, Mac Pro, MacBook, Malware, Patching, Radio Show, Radio_Show, Security, Security, Security Alerts, Security First, Tablet, Technology, Updates
Malware on Macs: Not as Bad as the Headlines Might Lead You to Believe Apple designs their computers with a security-first mindset but that does not mean that they are not able to be compromised by enterprising cybercriminals. Although, just like with all news...
Feb 29, 2020 | Asset Management, Best Practices, Business, Cable Companies, Cloud, Cloud Vendors, Computers, Cyber breaches, Cyber Insurance, Cybercrime, Cybersecurity, CyberTraining, Data, Data Assets, Data Brokers, data sharing, Data Storage, Databases, Domain Name Service, Email, Employees, Executives, Financial, Future Workforce, Generation-Y, Hackers, Hacking, Hacks, Incident Response, Information Technology, Insider Threat, Internet, Internet Service Providers, IoT, Jobs, Liability, Machine Learning, Malware, Malware, MFA, Nationstates, Networking, Open Source, Organized Crime, Password Managers, Passwords, Phishing, predictive algorithms, Radio Show, Radio_Show, Ransomware, Regulation, Regulatory Compliance, Security, Security, Security Assessments, Shadow-IT, Software As A Service, Technology, Technology, Unsecured, Web Tools, Zero-Day
All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not. Companies who continue to believe that they are not technology companies...
Feb 15, 2020 | Access Controls, Applications, Artificial Intelligence, Asset Management, Attack Vectors, Audit Logs, Business, Business Email Compromise, China, Cloud, Cloud Vendors, Compliance, Corporate Reputation, credential stealing, Cyber breaches, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Data Assets, Data Storage, Economic Disruption, Employees, Executives, Extortion, Government, Hackers, Hacking, Intellectual Property Theft, Internet, Intricate Data Systems, Legacy Systems, Malware, Managed Services Provider (MSP), Market Value, Nationstates, News, Patching, Phishing, Policies and Procedures, Radio Show, Regulatory Compliance, Security, Security Alerts, Smishing, Social Engineering, Technology, Third - Party, third-world, Updates, Vishing
Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government. They target military sub-contractors and sub-sub-contractors, universities,...
Feb 1, 2020 | Business, Business Email Compromise, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, CyberTraining, DeepFake, Employees, Employees, Hackers, Hacking, Hacking, HR, Human Element, Identity Theft, industrial espionage, Insider Threat, Internet, Malware, Malware, MFA, Patching, Phishing, Phishing, Psychology, Radio Show, Radio_Show, Security, Security Alerts, Social Engineering, Technology
Most Businesses Attacked By Business Email Compromise Last Year 2019 was the year for Business Email Compromises also known as BEC attacks. In fact, a majority of all businesses across the world became targets of these directed attacks involving their executives....
Feb 1, 2020 | anonymity, Applications, Applications, apps, Attack Vectors, audit logs, Best Practices, Business, CEO, Cyber breaches, Cyber Liability, Cybercrime, Cybersecurity, Data Assets, Executives, Executives, Extortion, Hackers, Hacking, Hacking, Internet, Location Data, Malware, Monitoring, Phishing, Phishing, Phone, Phones, privacy, Radio Show, Radio_Show, Security, Security, Smart Phone, Software, Surveillance, Technology, third-world, Video
Hired Journalist With Saudi Enemies: The Reason Behind Jeff Bezos Phone Hack Who are you hiring? Did you do your due diligence? I bet Jeff Bezos wishes he had before hiring a journalist to write for his paper who was an enemy of Saudi Arabia’s Crown Prince. ...